Never let go! Zenis virus interprets ransomware as the highest level of encryption, and zenis is never ignored.

Source: Internet
Author: User
Tags strong password microsoft help

Never let go! Zenis virus interprets ransomware as the highest level of encryption, and zenis is never ignored.

Never let go! The Zenis virus has the strongest ransomware encryption level. Recently, the  security center has detected a ransomware named "Zenis", which is named by the author of the virus. Unlike the ransomware virus that encrypts common files, the virus encrypts files in over 200 formats on the device after running, in addition, all format files under the non-system drive letter will also be locked, and even the exe executable program will not be released. At the same time, the virus also deletes backup files in the system to prevent important data from being recovered.

The following is a detailed analysis of the virus.

Virus Initialization

First, the virus first determines the execution condition during execution:

1. The producer program is named iis_agent32.exe.

2. Check whether the Active value exists in the HKCU \ SOFTWARE \ ZenisService item of the Registry.

When the file name is not iis_agent32.exe or the registry key value already exists, exit without encryption:

Figure 1

Figure 2

After the execution conditions are met, the following command is executed to delete the Shadow Copy, disable Startup Repair, and clear System Event Logs (generally, event logs are deleted through 3389 intrusion ), the following processes are also detected and ended:

Process name

Remarks

SQL

MSSQL database Process

Taskmgr

Task Manager Process

Regedit

Registry Editor Process

Backup

Backup program-related processes

Table 1

Code for deleting shadow copies, disabling startup repair, clearing system event logs, and killing some processes:

Figure 3

File encryption

Zenis uses a relatively traditional encryption method. It uses RSA 1024 + RC4 to encrypt files. That is, the virus generates an RSA 1024 Session Key on each user's machine, and an RC4 Session Key for each file.

For the decryption private key of RSA 1024 generated locally by the user, the virus uses another built-in RSA public key in the Code for encryption (the private key corresponding to the public key is in the hands of the virus author, not released ). The generated RSA 1024 encryption public Key is used to encrypt the RC4 Key generated by each file.

The encrypted file formats are embedded in virus programs. There are 204 file formats. It is also worth mentioning that even if the file extension is not included in this list, it does not mean security-because the virus encrypts all files not under the system drive letter (backup files are deleted ).

The encryption process is as follows:

Figure 4

Overview of keys used:

Key

Description

RPUBKEY

RSA 2048 Root Public Key, hard-coded in the program

RPIVKEY

RSA 2048 Root Private Key, held by the author, not publicly available currently

SPUBKEY

RSA 1024 Session Public Key, the unique Session KEY (Public Key) of each victim, used to encrypt the RC4 KEY

SPIVKEY

RSA 1024 Session Private Key, which is the unique Session KEY (Private Key) of each victim, used to decrypt the RC4 KEY

FILEKEY

RC4 256Bit KEY, which is generated for each file. SHA256 is generated and calculated using 'makerandomstr (64) '.

USERFLGKEY

RC4 512Bit KEY, which is generated by each victim user. SHA512 is generated and calculated using 'makerandomstr (128) '.

ENCFILEKEY

The FILEKEY encrypted by SPUBKEY is stored in the encrypted file.

ENCRYPTED

Use userflgkeyto encrypt spivkeyand then use rpubkeyto encrypt and then write it to the end of zenis-instructions.html

Table 2

First, the virus generates a 1024-bit RSA_Key-the Public Key SPUBKEY used for encryption and the private key SPIVKEY used for decryption. The random RC4 key USERFLGKEY is used to encrypt the New RSA 1024 to decrypt the private key SPIVKEY, and then the RC4 key USERFLGKEY is encrypted with the built-in RSA 2048 encryption Public Key RPUBKEY. The generated string data will replace the % ENCRYPTED % field in the ransomware information for decryption:

The encryption code is as follows:

Figure 5

Figure 6

The built-in RSA 2048 encryption public key of the virus is as follows (the private key is decrypted by the author ):

Figure 7

Code related to the file encryption process one by one:

Figure 8

Figure 9

The virus program writes the key information to the end of the encrypted file:

Figure 10

The encryption code of RC4 is as follows:

Figure 11

The following table lists the encrypted file extensions:

. Txt

. Doc

. Docx

. Xls

. Xlsx

. Ppt

. Pptx

. Odt

. Jpeg

. Png

. Csv

. SQL

. Mdb

. Sln

. Php

. Asp

. Aspx

. Html

. Xml

. Psd

. SQL

. Mp4

. 7z

. Rar

. M4a

. Wma

. Avi

. Wmv

. Csv

. D3dbsp

. Zip

. Sie

. Sum

. Ibank

. T13

. T12

. Qdf

. Gdb

. Tax

. Pkpass

. Bc6

. Bc7

. Bkp

. Qic

. Bkf

. Sidn

. Sidd

. Mddata

. Itl

. Itdb

. Icxs

. Hvpl

. Maid

. Hkdb

. Mdbackup

. Syncdb

. Gho

. Cas

. Svg

. Map

. Wmo

. Itm

. Sb

. Fos

. Mov

. Vdf

. Ztmp

. Sis

. Sid

. Ncf

. Menu

. Layout

. Dmp

. Blob

. Esm

. Vcf

. Vtf

. Dazip

. Fpk

. Mlx

. Kf

. Iwd

. Vpk

. Tor

. Psk

. Rim

. W3x

. HCG

. Ntl

. Arch00

. Lvl

. Snx

. Cfr

. Ff

. Vpp_pc

. Lrf

. M2

. Mcmeta

. Vfs0

. Mpqge

. Kdb

. Db0

. Dba

. Rofl

. Hkx

. Bar

. Upk

. Das

. Iwi

. Litemod

. Asset

. Forge

. Ltx

. Bsa

. Apk

. Re4

. Sav

. Lbf

. Slm

. Bik

. Epk

. Rgss3a

. Pak

. Big

. Wallet

. Wotreplay

. Xxx

. Desc

. Py

. M3u

. Flv

. Js

. Css

. Rb

. P7c

. Pk7

. P7b

. P12

. Pfx

. Pem

. Crt

. Cer

. Der

. X3f

. Srw

. ARG

. Ptx

. R3d

. Rw2

. Rwl

. Raw

. Raf

. Open

. Nrw

. Mrwref

. Mef

. Erf

. Kdc

. Dcr

. Cr2

. Crw

. Bay

. Sr2

. Srf

. Arw

. 3fr

. Dng

. Jpe

. Jpg

. Cdr

. Indd

. Ai

. Eps

. Pdf

. Pdd

. Dbf

. Mdf

. Wb2

. Rtf

. Wpd

. Dxg

. Xf

. Dwg

. Pst

. Accdb

. Mdb

. Pptm

. Pptx

. Ppt

. Xlk

. Xlsb

. Xlsm

. Xlsx

. Xls

. Wps

. Docm

. Docx

. Doc

. Odb

. Odc

. Odm

. Odp

. Ods

. Odt

Table 3

After encryption is completed, the file name will also be changed to the format of "Zenis-[2 random characters]. [12 random characters:

Figure 12

For example 361test.txt is encrypted will be changed to: Zenis-EO.V1OqyzpYfV5z

Figure 13

When a virus traverses a file, once it finds that the file extension meets the characteristics of the backup file, it will not be encrypted, but will overwrite the file with the content immediately three times before deleting the backup file. This is to make it difficult for recruiters to recover files from backups. The list of backup file extensions to be deleted is as follows:

. Win

. Wbb

. W01

. V2i

. Trn

. Tibkp

. Sqb

. Rbk

. Qic

. Old

. Obk

. Ful

. Bup

. Bkup

. Bkp

. Bkf

. Bff

. Bak

. Bak2

. Bak3

. Edb

. Stm

Table 4

The related code is as follows:

Figure 14

Figure 15

In addition, the virus will exclude the system and some soft directories, and the files in these directories will not be encrypted:

Windows

NVIDIA Corporation

Program Files

Microsoft. NET

ProgramData

Internet Explorer

PerfLogs

Kaspersky Lab

$ Recycle. Bin

McAfee

Microsoft

Avira

Microsoft Help

Spytech software

Microsoft App

Sysconfig

Certification Kit

Avast

Windows Defender

Dr. Web

ESET

Symantec

COMODO

Symantec_Client_Security

Windows NT

System volume information

Windows Kits

AVG

Windows Mail

Microsoft Shared

Windows Media Player

Common Files

Windows Multimedia Platform

Outlook Express

Windows Phone Kits

Movie Maker

Windows Phone

Chrome

Silverlight Kits

Mozilla Firefox

Temp

Opera

Windows Photo Viewer

YandexBrowser

Windows Protable Devices

Ntldr

Windows Slidebar

Wsus

WindowsPowerShell

Public

Table

The encryption used by the internal rsa to generate a prompt message "zenis-instructions.html", including instructions and the email address Code related to the ransomware Author:

Figure 16

The virus-generated ransomware page contains a hidden Base64-encoded string, which is actually the decryption private key as described above-the double encryption. To decrypt a string to obtain the decryption private key, you can only use the private key in the hands of the virus author. After successful extortion, the virus author (if trustworthy) also sends the corresponding decryption program or key to the target user through the information:

Figure 17

Figure 18

 anti-virus experts tried to contact the virus author's email: After successfully decrypting a file to prove their decryption capabilities, transfer 0.2018 bitcoin (about 13000 RMB at the time of this article) to this wallet address: 17o83ughmzkemkmslz4bhrmf75urrentlpkf

Figure 19

Figure 20

Conclusion

Due to the various encryption formats of Zenis ransomware, files related to backup will be overwritten and deleted multiple times, some PE files and data files of some common software may fail to run normally after they are encrypted or deleted. Therefore, compared with normal ransomware, the virus is more destructive to the system. In addition, the virus may be attacked by intrusion into the Remote Desktop weak password service for virus injection. Therefore, it is recommended that the server user:

1. Change to a strong password;

2. Modify the default 3389 port;

3. install the latest patch on the server;

4. Enable network identity authentication NLA;

5. install security software for protection.  of the security guard has taken the lead in scanning and killing the ransomware in China. At the same time, can defend against various ransomware.

Figure 21


Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.